SlideShare a Scribd company logo
Shashi chandra
by
Computer security
• The protection of
computer based resources
against unauthorized use or
natural disaster is known
as Security.
It defines the rights of the
individual users or organizations to keep their
personal data and information
Most of the damages
of data is caused by errors and
omissions. An organization always
needs accurate data for
transaction processing, providing
better service and making
A dishonest
programmer can easily any
software or data, if proper control
measures are not provided to the
system.
When the computer
resources can be misused
for unauthorized or illegal
function.
Fire and natural disaster like
floods , storms, snow-storms ,
lightning etc…
:-
The unauthorized modification of
data by dishonest employees of the
organization.
The special routines of a program .it
check whether the program is
performing correctly or not. It
do not have regular control
mechanisms and passwords. It is
use only when the normal
functioning of the software is
disturbed or stopped .
The special routines that
causes excessive damage
to the data or vital
program.
To get into someone
else’s computer system
without permission in
order to find out
information or do
Unauthorized copying of
confidential data from
hard disk to floppy
disks , which cannot be
detected by security
persons.
Monitoring of data
transmissions which are
meant for other persons.
refers to setting up a special
transmission path for
diverting the flow of data.
Unauthorized copying
of
data and programs
from all over the world
Illegal copying of
software's for the
purpose of distribution
It includes safeguards
against damage of
hardware's, software's and
data due to the physical
environment of the pc.
-
i.Using Password
ii.Fingerprints
iii.Keys
iv.Restricted
System
The access to various
computer resources by
authorized users must be
properly controlled.Examination of the
system (Application software) where
the program are working or not.
Encryption refers
to encode data
by converting the
standard data
code into
proprietary code.

• Security is critical for
maintaining the integrity of data
stored on the network servers.
 Login and Password Security
 Account Security
 Access Right
 Information about group to which the
user belongs.
The contingency measures
that an organization must
take to recover the data in
case it is damaged.
It is the most
efficient method of disaster
recovery. It is a duplicate copies
of important data and software.
Standards of moral
conduct to be followed by
employees for using various
Computer security

More Related Content

PDF
Computer Security Threats
PPTX
Encryption.ppt
PDF
Cybersecurity Awareness Infographics
PPTX
Cybercrime and Security
PPT
Computer security overview
 
PPTX
Data Acquisition
PDF
Cybersecurity Awareness Posters - Set #2
PPTX
Introduction to Information Security
Computer Security Threats
Encryption.ppt
Cybersecurity Awareness Infographics
Cybercrime and Security
Computer security overview
 
Data Acquisition
Cybersecurity Awareness Posters - Set #2
Introduction to Information Security

What's hot (20)

PPT
Introduction To Computer Security
PPTX
Introduction to Cybersecurity Fundamentals
PPT
Network security
PPT
Computer Security and safety
PPTX
Types of attacks
PPT
DATA SECURITY AND CONTROL.ppt
PDF
Network security - OSI Security Architecture
DOCX
The CIA Triad - Assurance on Information Security
PPTX
Computer security
PDF
Cyber Security and Cloud Computing
PPTX
Computer security risks
PDF
Information Security Lecture Notes
PPTX
Network security
PPTX
Network security
PDF
CS6004 Cyber Forensics
PDF
1. introduction to cyber security
PPTX
Mobile security
PPTX
Mobile Device Security
PPTX
Cyber Security PPT.pptx
PPTX
Cyber security & awareness
Introduction To Computer Security
Introduction to Cybersecurity Fundamentals
Network security
Computer Security and safety
Types of attacks
DATA SECURITY AND CONTROL.ppt
Network security - OSI Security Architecture
The CIA Triad - Assurance on Information Security
Computer security
Cyber Security and Cloud Computing
Computer security risks
Information Security Lecture Notes
Network security
Network security
CS6004 Cyber Forensics
1. introduction to cyber security
Mobile security
Mobile Device Security
Cyber Security PPT.pptx
Cyber security & awareness
Ad

Similar to Computer security (20)

PPTX
It security
PPTX
Security and management
DOCX
Cat21:Development Mangement Information Systems
PPTX
Computer security
PPTX
operating system ppt tegeng2.pptxguktgjh
PPTX
CH01-CompSec4e.pptx
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
PDF
Operations Security Presentation
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
PPTX
Computer security concepts
PPTX
Protection and security
PDF
OPERATING SYSTEM SECURITY
PPTX
Date security introduction
PDF
Chapter 1 - Introduction.pdf
KEY
Mis
PPTX
Dos unit 5
PDF
information security introduction for campus students.pdf
PPT
CompTIA Security+ Module1: Security fundamentals
PPTX
security introduction and overview lecture1 .pptx
It security
Security and management
Cat21:Development Mangement Information Systems
Computer security
operating system ppt tegeng2.pptxguktgjh
CH01-CompSec4e.pptx
Computer Securityyyyyyyy - Chapter 1.ppt
Operations Security Presentation
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
Computer security concepts
Protection and security
OPERATING SYSTEM SECURITY
Date security introduction
Chapter 1 - Introduction.pdf
Mis
Dos unit 5
information security introduction for campus students.pdf
CompTIA Security+ Module1: Security fundamentals
security introduction and overview lecture1 .pptx
Ad

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Institutional Correction lecture only . . .
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
master seminar digital applications in india
PPTX
Pharma ospi slides which help in ospi learning
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
PPH.pptx obstetrics and gynecology in nursing
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Basic Mud Logging Guide for educational purpose
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Institutional Correction lecture only . . .
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Types and Its function , kingdom of life
Supply Chain Operations Speaking Notes -ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pre independence Education in Inndia.pdf
Insiders guide to clinical Medicine.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
master seminar digital applications in india
Pharma ospi slides which help in ospi learning
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPH.pptx obstetrics and gynecology in nursing

Computer security

  • 3. • The protection of computer based resources against unauthorized use or natural disaster is known as Security.
  • 4. It defines the rights of the individual users or organizations to keep their personal data and information Most of the damages of data is caused by errors and omissions. An organization always needs accurate data for transaction processing, providing better service and making
  • 5. A dishonest programmer can easily any software or data, if proper control measures are not provided to the system. When the computer resources can be misused for unauthorized or illegal function. Fire and natural disaster like floods , storms, snow-storms , lightning etc…
  • 6. :- The unauthorized modification of data by dishonest employees of the organization.
  • 7. The special routines of a program .it check whether the program is performing correctly or not. It do not have regular control mechanisms and passwords. It is use only when the normal functioning of the software is disturbed or stopped .
  • 8. The special routines that causes excessive damage to the data or vital program. To get into someone else’s computer system without permission in order to find out information or do
  • 9. Unauthorized copying of confidential data from hard disk to floppy disks , which cannot be detected by security persons.
  • 10. Monitoring of data transmissions which are meant for other persons. refers to setting up a special transmission path for diverting the flow of data.
  • 11. Unauthorized copying of data and programs from all over the world Illegal copying of software's for the purpose of distribution
  • 12. It includes safeguards against damage of hardware's, software's and data due to the physical environment of the pc.
  • 14. The access to various computer resources by authorized users must be properly controlled.Examination of the system (Application software) where the program are working or not.
  • 15. Encryption refers to encode data by converting the standard data code into proprietary code.
  • 16.  • Security is critical for maintaining the integrity of data stored on the network servers.  Login and Password Security  Account Security  Access Right  Information about group to which the user belongs.
  • 17. The contingency measures that an organization must take to recover the data in case it is damaged. It is the most efficient method of disaster recovery. It is a duplicate copies of important data and software. Standards of moral conduct to be followed by employees for using various